Homeland Security Advisory System : an assessment of its ability to formulate a risk message
Ryczek, Martin E.
MetadataShow full item record
The Homeland Security Advisory System was conceived in 2003. Within seven years, the system has become marginalized, even though the country continues to be at war with the forces of terrorism. The reason for this is that the system as designed does not allow for the successful crafting of a complete warning message. A warning message needs to be specific enough to allow the warning recipient to make the appropriate linkages between the warning message and the physical and social manifestations of the threat. This linkage allows the recipient to form his own unique risk reality. Once that is formed, the recipient may be motivated to take appropriate precautions to counter the threat. A warning message that does not allow for the formation of a risk reality can never be effective because the recipient will fail to internalize the risk and thus fail to take the appropriate action to counter the threat.
CHDS State/LocalApproved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Maguire, Jacqueline (Monterey California. Naval Postgraduate School, 2013-03);The use of public diplomacy is an essential component of counterterrorism efforts but, to date, the United States has not been as effective in its attempts to utilize strategic communication against the threat of violent ...
Wootten, David Raiman (Monterey, California. Naval Postgraduate School, 1996-03);Steganography is a method an individual uses to secretly communicate, whereby the transmitting agent hides a message within some medium, so that only an intended recipient can detect the message's presence. Researchers who ...
Coffman, James Wyatt. (Monterey, California. Naval Postgraduate School, 2001-09);The Information Assurance Vulnerability Alert (IAVA) process was established to provide an early warning and tracking capability for protecting Department of Defense (DoD) networks against identified system vulnerabilities. ...